A wireless network access authentication method and device
A wireless network access and authentication method technology, applied in the field of wireless network access authentication methods and devices, capable of solving problems such as reducing user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0075] An embodiment of the present invention provides a wireless network access authentication method, which is applied to the server side, such as figure 1 As shown, the processing flow of the method of this embodiment includes the following steps:
[0076] Step 101, receiving the access request forwarded by the gateway.
[0077] Wherein, the access request is an access request intercepted by the gateway and initiated by the terminal to the target server.
[0078] A terminal in a region first accesses the wireless network through a wireless signal transmitted by a wireless access point such as a WIFI hotspot, and after obtaining the target address input by the user, initiates an access request to the target server corresponding to the target address. The gateway in the region intercepts the access request initiated by the terminal to the target server, and forwards the access request to a server; the server receives the access request forwarded by the gateway.
[0079] Whe...
Embodiment 2
[0122] This embodiment provides a wireless network access authentication method, which is applied to image 3 In the system shown, as image 3 As shown, the system includes: a server 31, a firewall 321 and a firewall 322, a gateway 331 and a gateway 332 deployed in different regions under the server, a switch 341 and a switch 342, a wireless access point 351 and a wireless access point 352 , terminal 361 and terminal 362; terminal 361 accesses gateway 331 through wireless access point 351 and switch 341, terminal 362 accesses gateway 332 through wireless access point 352 and switch 342; gateway 331 and gateway 332 provide according to the connection of server 31 The access method is to access the server 31 through the firewall 321 and the firewall 322 respectively; the server 31 checks the legality of the gateway 331 and the gateway 332, and after the verification is successful, communicates and configures synchronously with the gateway 331 and the gateway 332 through http.
...
Embodiment 3
[0182] An embodiment of the present invention provides a server, such as Figure 5 As shown, the server includes: a first receiving unit 501, an acquiring unit 502, an authenticating unit 503, a first sending unit 504, and a saving unit 505; wherein,
[0183] The first receiving unit 501 is configured to receive an access request forwarded by a gateway, where the access request is an access request initiated by a terminal intercepted by the gateway to a target server;
[0184] The acquiring unit 502 is configured to acquire a terminal identifier corresponding to the terminal according to the access request received by the first receiving unit 501;
[0185] The authentication unit 503 is configured to determine whether the terminal identifier obtained by the acquiring unit 502 is in a pre-stored terminal identifier table, and the pre-stored terminal identifier table includes terminal identification;
[0186] The first sending unit 504 is configured to push a user authenticati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


